X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 16/Jun 18:34

Phishing Attack Abuses Windows Search Protocol to Deploy Malware

  A recently developed phishing campaign has emerged, leveraging the Windows Search protocol to deliver malicious scripts to unsuspecting users. This sophisticated attack uses HTML attachments to exploit the search-ms URI, pushing harmful batch files hosted on remote servers. The…

Articles similaires

Sorry! Image not available at this time

Hackers Weaponize Windows Installer (MSI) Files to Deliver Malware

itsecuritynews.info - 19/Jun 13:09

Cybersecurity researchers have uncovered a sophisticated malware campaign orchestrated by a threat actor group, Void Arachne. This group has targeted...

Sorry! Image not available at this time

Crafty Criminals Use Fake Error Messages to Deploy Malware via PowerShell

itsecuritynews.info - 21/Jun 14:33

  Criminals are targeting thousands of organizations worldwide with social engineering attacks that use fake error messages to trick users into...

Sorry! Image not available at this time

Fake IT support sites push malicious PowerShell scripts as Windows fixes

bleepingcomputer.com - 30/Jun 14:21

Fake IT support sites promote malicious PowerShell "fixes" for common Windows errors, like the 0x80070643 error, to infect devices with...

Sorry! Image not available at this time

ONNX Phishing Targets Financial Companies’ Microsoft 365 Accounts

itsecuritynews.info - 19/Jun 16:33

ONNX Store new PhaaS is targeting Microsoft 365 and Office 365 accounts in financial companies. The hackers use QR codes in PDF attachments to lure...

Sorry! Image not available at this time

New attack uses MSC files and Windows XSS flaw to breach networks

bleepingcomputer.com - 24/Jun 19:03

A novel command execution technique dubbed 'GrimResource' uses specially crafted MSC (Microsoft Saved Console) and an unpatched Windows XSS flaw to...

Sorry! Image not available at this time

Diamorphine Rootkit Exploiting Linux Systems In The Wild

itsecuritynews.info - 20/Jun 07:10

Threat actors exploit Linux systems because they are prevalent in organizations that host servers, databases, and other important resources. ...

Sorry! Image not available at this time

Hackers Exploit Progressive Web Apps to Steal Passwords

itsecuritynews.info - 20/Jun 15:06

In a concerning development for cybersecurity, hackers are increasingly leveraging Progressive Web Apps (PWAs) to execute sophisticated phishing...

Sorry! Image not available at this time

New RAT Malware SneakyChef & SugarGhost Attack Windows Systems

itsecuritynews.info - 24/Jun 04:34

Talos Intelligence has uncovered a sophisticated cyber campaign attributed to the threat actor SneakyChef. This operation leverages the SugarGh0st RAT...

Sorry! Image not available at this time

Millions of OpenSSH Servers Potentially Vulnerable to Remote regreSSHion Attack

itsecuritynews.info - 01/Jul 12:32

Millions of OpenSSH servers could be vulnerable to unauthenticated remote code execution due to a vulnerability tracked as regreSSHion and...

Sorry! Image not available at this time

Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer

itsecuritynews.info - 18/Jun 14:13

Threat actors are luring unsuspecting users with free or pirated versions of commercial software to deliver a malware loader called Hijack Loader,...